Role in IT decision-making process:Align Business & IT GoalsCreate IT StrategyDetermine IT NeedsManage Vendor RelationshipsEvaluate/Specify Brands or VendorsOther RoleAuthorize PurchasesNot Involved

Work Phone:

Company:

Company Size:

Industry:

Street Address

City:

Zip/postal code

State/Province:

Country:

Occasionally, we send subscribers special offers from select partners. Would you like to receive these special partner offers via e-mail?YesNo

Your registration with Eweek will include the following free email newsletter(s):News & Views

By submitting your wireless number, you agree that eWEEK, its related properties, and vendor partners providing content you view may contact you using contact center technology. Your consent is not required to view content or use site features.

By clicking on the "Register" button below, I agree that I have carefully read the Terms of Service and the Privacy Policy and I agree to be legally bound by all such terms.

WEBINAR:On-Demand

Once again, security researchers are pointing an accusing finger at small office/home office (SOHO) routers as being vulnerable to exploitation.

This time the research group is Team Cymru, and the report claims that more than 300,000 devices have been infected. The infected devices are mostly in Europe and Asia and involve overwritten DNS settings.

DNS (Domain Name System) is the technology that connects Internet addresses with Internet domains. When DNS is infected, an attacker has the ability to redirect traffic to an arbitrary destination.

According to the Team Cymru report, the compromised SOHO routers came from multiple manufacturers.

Further reading

"We assess that consumer unfamiliarity with configuring these devices as well as frequently insecure default setting, backdoors in firmware and commodity-level engineering standards make SOHO-type wireless routers a very attractive target for cyber criminals," the report stated.

Team Cymru isn't the only one finding flaws in SOHO routers lately. A report from security firm Tripwire found that 80 percent of the top 25 best-selling SOHO wireless routers sold on Amazon have a security vulnerability.

Going a step further, Tripwire found that 46 percent of employees have not changed the default wireless password on their wireless routers. The Tripwire study also found that 59 percent of employees have not updated their router firmware. That means that even if the router vendor has updated for a security vulnerability, the users are still at risk.

The emergence of SOHO routers as being an injection point for attackers is not a new phenomenon.

Back in 2010, a security researcher at the Black Hat conference exposed how weakness in SOHO routers could be leaving millions of users at risk. Even further back, in 2002, Linksys routers were found to be at risk from flaws.

The risks of SOHO routers are nothing new, and yet attacks persist and are likely to continue to occur. The challenge of the modern IT security landscape is that no router is an island and any device can be easily discovered, making every device a potential target.

Yes, of course router vendors can and should ship routers that are secure by default. Router vendors should also enforce strong password policies and not allow users to keep default passwords.

It would also be a great idea if SOHO router vendors embrace the same patching methodology that Adobe, Microsoft and Google now offer their users, namely automatic updates.

The battleground that is modern IT security doesn't stop on the enterprise or the data center; it reaches to our homes, too. The same care and rigor that goes into enterprise security should find its way into SOHO devices. If not, SOHO users are likely to encounter the same problems that enterprises have already solved.

Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

Advertiser Disclosure:
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.